Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (57)
  • Open Access

    REVIEW

    A Survey on Sensor- and Communication-Based Issues of Autonomous UAVs

    Pavlo Mykytyn1,2,*, Marcin Brzozowski1, Zoya Dyka1,2, Peter Langendoerfer1,2

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.2, pp. 1019-1050, 2024, DOI:10.32604/cmes.2023.029075

    Abstract The application field for Unmanned Aerial Vehicle (UAV) technology and its adoption rate have been increasing steadily in the past years. Decreasing cost of commercial drones has enabled their use at a scale broader than ever before. However, increasing the complexity of UAVs and decreasing the cost, both contribute to a lack of implemented security measures and raise new security and safety concerns. For instance, the issue of implausible or tampered UAV sensor measurements is barely addressed in the current research literature and thus, requires more attention from the research community. The goal of this survey is to extensively review… More >

  • Open Access

    ARTICLE

    Computational Intelligence Driven Secure Unmanned Aerial Vehicle Image Classification in Smart City Environment

    Firas Abedi1, Hayder M. A. Ghanimi2, Abeer D. Algarni3, Naglaa F. Soliman3,*, Walid El-Shafai4,5, Ali Hashim Abbas6, Zahraa H. Kareem7, Hussein Muhi Hariz8, Ahmed Alkhayyat9

    Computer Systems Science and Engineering, Vol.47, No.3, pp. 3127-3144, 2023, DOI:10.32604/csse.2023.038959

    Abstract Computational intelligence (CI) is a group of nature-simulated computational models and processes for addressing difficult real-life problems. The CI is useful in the UAV domain as it produces efficient, precise, and rapid solutions. Besides, unmanned aerial vehicles (UAV) developed a hot research topic in the smart city environment. Despite the benefits of UAVs, security remains a major challenging issue. In addition, deep learning (DL) enabled image classification is useful for several applications such as land cover classification, smart buildings, etc. This paper proposes novel meta-heuristics with a deep learning-driven secure UAV image classification (MDLS-UAVIC) model in a smart city environment.… More >

  • Open Access

    ARTICLE

    LSTDA: Link Stability and Transmission Delay Aware Routing Mechanism for Flying Ad-Hoc Network (FANET)

    Farman Ali1, Khalid Zaman2, Babar Shah3, Tariq Hussain4, Habib Ullah5, Altaf Hussain5, Daehan Kwak6,*

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 963-981, 2023, DOI:10.32604/cmc.2023.040628

    Abstract The paper presents a new protocol called Link Stability and Transmission Delay Aware (LSTDA) for Flying Ad-hoc Network (FANET) with a focus on network corridors (NC). FANET consists of Unmanned Aerial Vehicles (UAVs) that face challenges in avoiding transmission loss and delay while ensuring stable communication. The proposed protocol introduces a novel link stability with network corridors priority node selection to check and ensure fair communication in the entire network. The protocol uses a Red-Black (R-B) tree to achieve maximum channel utilization and an advanced relay approach. The paper evaluates LSTDA in terms of End-to-End Delay (E2ED), Packet Delivery Ratio… More >

  • Open Access

    ARTICLE

    Multi-Modal Scene Matching Location Algorithm Based on M2Det

    Jiwei Fan, Xiaogang Yang*, Ruitao Lu, Qingge Li, Siyu Wang

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 1031-1052, 2023, DOI:10.32604/cmc.2023.039582

    Abstract In recent years, many visual positioning algorithms have been proposed based on computer vision and they have achieved good results. However, these algorithms have a single function, cannot perceive the environment, and have poor versatility, and there is a certain mismatch phenomenon, which affects the positioning accuracy. Therefore, this paper proposes a location algorithm that combines a target recognition algorithm with a depth feature matching algorithm to solve the problem of unmanned aerial vehicle (UAV) environment perception and multi-modal image-matching fusion location. This algorithm was based on the single-shot object detector based on multi-level feature pyramid network (M2Det) algorithm and… More >

  • Open Access

    Time-Efficient Blockchain Framework for Improved Data Transmission in Autonomous Systems

    Abdulrahman M. Abdulghani, Wilbur L. Walters, Khalid H. Abed*

    Journal of Blockchain and Intelligent Computing, Vol.1, pp. 1-13, 2023, DOI:10.32604/jbic.2023.041340

    Abstract Blockchain technology is increasingly used to design trustworthy and reliable platforms for sharing information in a plethora of industries. It is a decentralized system that acts as an immutable record for storing data. It has the potential to disrupt a range of fields that rely on data, including autonomous systems like Unmanned Aerial Vehicles (UAVs). In this paper, we propose a framework based on blockchain and distributed ledger technology to improve transmission time and provide a secured and trusted method for UAVs to transfer data to the consumer efficiently while maintaining data reliability. The results show that our framework enables… More >

  • Open Access

    ARTICLE

    IRS Assisted UAV Communications against Proactive Eavesdropping in Mobile Edge Computing Networks

    Ying Zhang1,*, Weiming Niu2, Leibing Yan1

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 885-902, 2024, DOI:10.32604/cmes.2023.029234

    Abstract In this paper, we consider mobile edge computing (MEC) networks against proactive eavesdropping. To maximize the transmission rate, IRS assisted UAV communications are applied. We take the joint design of the trajectory of UAV, the transmitting beamforming of users, and the phase shift matrix of IRS. The original problem is strong non-convex and difficult to solve. We first propose two basic modes of the proactive eavesdropper, and obtain the closed-form solution for the boundary conditions of the two modes. Then we transform the original problem into an equivalent one and propose an alternating optimization (AO) based method to obtain a… More >

  • Open Access

    ARTICLE

    Enhancement of UAV Data Security and Privacy via Ethereum Blockchain Technology

    Sur Singh Rawat1,*, Youseef Alotaibi2, Nitima Malsa1, Vimal Gupta1

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1797-1815, 2023, DOI:10.32604/cmc.2023.039381

    Abstract Unmanned aerial vehicles (UAVs), or drones, have revolutionized a wide range of industries, including monitoring, agriculture, surveillance, and supply chain. However, their widespread use also poses significant challenges, such as public safety, privacy, and cybersecurity. Cyberattacks, targeting UAVs have become more frequent, which highlights the need for robust security solutions. Blockchain technology, the foundation of cryptocurrencies has the potential to address these challenges. This study suggests a platform that utilizes blockchain technology to manage drone operations securely and confidentially. By incorporating blockchain technology, the proposed method aims to increase the security and privacy of drone data. The suggested platform stores… More >

  • Open Access

    ARTICLE

    Improving Intrusion Detection in UAV Communication Using an LSTM-SMOTE Classification Method

    Abdulrahman M. Abdulghani, Mokhles M. Abdulghani, Wilbur L. Walters, Khalid H. Abed*

    Journal of Cyber Security, Vol.4, No.4, pp. 287-298, 2022, DOI:10.32604/jcs.2023.042486

    Abstract Unmanned Aerial Vehicles (UAVs) proliferate quickly and play a significant part in crucial tasks, so it is important to protect the security and integrity of UAV communication channels. Intrusion Detection Systems (IDSs) are required to protect the UAV communication infrastructure from unauthorized access and harmful actions. In this paper, we examine a new approach for enhancing intrusion detection in UAV communication channels by utilizing the Long Short-Term Memory network (LSTM) combined with the Synthetic Minority Oversampling Technique (SMOTE) algorithm, and this integration is the binary classification method (LSTM-SMOTE). We successfully achieved 99.83% detection accuracy by using the proposed approach and… More >

  • Open Access

    ARTICLE

    RO-SLAM: A Robust SLAM for Unmanned Aerial Vehicles in a Dynamic Environment

    Jingtong Peng*

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2275-2291, 2023, DOI:10.32604/csse.2023.039272

    Abstract When applied to Unmanned Aerial Vehicles (UAVs), existing Simultaneous Localization and Mapping (SLAM) algorithms are constrained by several factors, notably the interference of dynamic outdoor objects, the limited computing performance of UAVs, and the holes caused by dynamic objects removal in the map. We proposed a new SLAM system for UAVs in dynamic environments to solve these problems based on ORB-SLAM2. We have improved the Pyramid Scene Parsing Network (PSPNet) using Depthwise Separable Convolution to reduce the model parameters. We also incorporated an auxiliary loss function to supervise the hidden layer to enhance accuracy. Then we used the improved PSPNet… More >

  • Open Access

    ARTICLE

    Secrecy Efficiency Maximization in Intelligent Reflective Surfaces Assisted UAV Communications

    Hui Wei, Leibing Yan*

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.2, pp. 1805-1824, 2023, DOI:10.32604/cmes.2023.028072

    Abstract This paper focuses on the secrecy efficiency maximization in intelligent reflecting surface (IRS) assisted unmanned aerial vehicle (UAV) communication. With the popularization of UAV technology, more and more communication scenarios need UAV support. We consider using IRS to improve the secrecy efficiency. Specifically, IRS and UAV trajectories work together to counter potential eavesdroppers, while balancing the secrecy rate and energy consumption. The original problem is difficult to solve due to the coupling of optimization variables. We first introduce secrecy efficiency as an auxiliary variable and propose relaxation optimization problem, and then prove the equivalence between relaxation problem and the original… More >

Displaying 11-20 on page 2 of 57. Per Page